A Cyber Attack On Japan Could Bring The USA To War

US secretary of state Mike Pompeo recently declared that “a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.” The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.

“This is significant from the perspective of deterrence,” said Japanese defense secretary Takeshi Iwaya, also present at the briefing.

In the first such meeting between Japanese and US defense officials since 2017, the two sides shared their concerns for stability in the region.

“Geopolitical competition and coercive attempts to undermine international rules, norms, and institutions, especially from China, present challenges to the alliance,” Pompeo said.

At a time when US lawmakers argue over what constitutes state-coordinated digital espionage, definitions are in order.

According to the Japanese Defence Ministry, a cyber-attack is an “abuse of information and communications networks” in the attempt to “access, steal, falsify or destroy information.” Defense against such attacks, there were almost 130b of them against Japan in 2016, has become a pressing issue for the Japanese government. With a majority of these attacks originating from China, it’s difficult to say how the US and Japan will now respond to them.

In a statement, from their defense officials, they said actions would be merited “on a case-by-case basis, and through close consultations.”

But difficulty in tracking responsible actors poses a challenge. In February, when the Australian parliament experienced an attack on its networks, there was speculation that the attempted breach originated from China. 

The attack “suggests a state actor because it’s hard to make money from breaching a parliamentary system,” said Fergus Hanson, head of the International Cyber Policy Center in Australia.

Until simple-to-understand evidence is possible in cyber-attacks, denying as slander will remain the status quo for world powers like China.

Meanwhile, defensive cooperation between allies like the US and Japan will continue behind the scenes.And it would appear that Japan can use all the help it can get. Late last year its minister of cybersecurity admitted not knowing how to use a computer and being confused as to what USB drives are.

Quartz

You Might Also Read:

NATO Could Go To War In Response To A Cyber Attack?:

 

 

« Hackers Delight: Poor Password Security
The CIA's Cloud Contract Is Worth Billions »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

Secret Intelligence Service (SIS - MI6) - UK

Secret Intelligence Service (SIS - MI6) - UK

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.